Techniques are disclosed which can allow a mobile device, which is no longer being updated by the device manufacturer, to receive updates from the manufacturer. In an implementation, an international mobile equipment identity (IMEI) is received from the mobile device that identifies a model of the mobile device. The mobile device can have at least one application that is unable to communicate with a server of the mobile device's manufacturer. A provisioning server may determine that the mobile device is depreciated based upon the IMEI, and obtain a key unique to the mobile device. The key and at least one Access Point Name may be transmitted to the mobile device, which can allow the mobile device to direct its data traffic to the server of the manufacturer.
|
14. A computer-implemented method, comprising:
receiving an international mobile equipment identity (IMEI) from a mobile device that identifies a model of the mobile device, the mobile device having at least one application that is unable to communicate with a server of a manufacturer of the mobile device;
determining, by a provisioning server, that the at least one application is unable to communicate with the server of the manufacturer because the one of the plurality of mobile devices is depreciated based upon the received IMEI;
obtaining, by the provisioning server, a key unique to the mobile device, wherein the provisioning server is separate from the server of the manufacturer and is configured to communicate with the mobile device; and
transmitting to the mobile device the key obtained by the provisioning server, the key comprising at least one Access Point Name (APN), wherein the APN directs traffic from the at least one application of the mobile device to the server of the manufacturer.
20. A non-transitory computer readable medium having stored thereon computer readable instructions that are executable to cause one or more processors to perform operations, comprising:
receiving an international mobile equipment identity (IMEI) from a mobile device that identifies a model of the mobile device, the mobile device having at least one application that is unable to communicate with a server of a manufacturer of the mobile device;
determining, by a provisioning server, that the at least one application is unable to communicate with the server of the manufacturer because the one of the plurality of mobile devices is depreciated based upon the IMEI;
obtaining, by the provisioning server, a key unique to the mobile device, wherein the provisioning server is separate from the server of the manufacturer and is configured to communicate with the mobile device; and
transmitting to the mobile device the key obtained by the provisioning server, the key comprising at least one Access Point Name (APN), wherein the APN directs traffic from the at least one application of the mobile device to the server of the manufacturer.
1. A system, comprising:
a non-transitory memory configured to store data associated with a model for each of a plurality of mobile devices made by a manufacturer;
one or more hardware processors coupled to the non-transitory memory and configured to read instructions from the non-transitory memory to cause the system to perform operations comprising:
receiving an international mobile equipment identity (IMEI) from one of the plurality of mobile devices that identifies the model associated with the one of the plurality of mobile devices, the one of the plurality of mobile devices having at least one application that is unable to communicate with a server of a manufacturer of the one of the plurality of mobile devices;
determining, by a provisioning server, that the at least one application is unable to communicate with the server of the manufacturer because the one of the plurality of mobile devices is depreciated based upon the received IMEI, wherein the provisioning server is separate from the server of the manufacturer and is configured to communicate with the one of the plurality of mobile devices;
obtaining, by the provisioning server, a key unique to the one of the plurality of mobile devices; and
transmitting to the one of the plurality of mobile devices the key obtained by the provisioning server, the key comprising at least one Access Point Name (APN), wherein the APN directs traffic from the one of the plurality of mobile devices to the server of the manufacturer.
3. The system of
transmitting, via an electronic network, a request to the manufacturer for the key unique to the one of the plurality of mobile devices, the request including an indication of the model of the one of the plurality of mobile devices and a unique identifier for the one of the plurality of mobile devices; and
responsive to the request, receiving via the electronic network, the key from the manufacturer.
4. The system of
5. The system of
6. The system of
7. The system of
8. The system of
9. The system of
10. The system of
11. The system of
12. The system of
13. The system of
15. The computer-implemented method of
16. The computer-implemented method of
transmitting, via an electronic network, a request to the manufacturer for the key unique to the mobile device, the request including an indication of at least one of the model of the mobile device and a unique identifier for the mobile device; and
responsive to the request, receiving via the electronic network, the key from the manufacturer.
17. The computer-implemented method of
18. The computer-implemented method of
19. The computer-implemented method of
|
A mobile phone is typically registered on a mobile network utilizing a subscriber identification module (SIM) circuit, which can be a separate card or integrated in the hardware of a given device (e.g., an eSIM). The SIM can contain a unique identification number, authentication information, and/or other information that authenticate and identify a subscriber (e.g., the mobile device) on a mobile carrier's network. SIM cards can have an application that communicates with the device and/or network. An international mobile equipment identity (IMEI) can be a number utilized by a carrier network (e.g., GSM, CDMA, TDMA, LTE, 5G, and potential successor wireless networks utilizing devices employing IMEIs, etc.) to identify a valid device. The IMEI is associated with the device, as opposed to the subscriber.
A primary network operator (e.g., Verizon®) may have a relationship with the mobile device manufacturer in contrast to secondary or tertiary network operators which do not have a relationship with the device manufacturer. Mobile devices are frequently purchased as new and used on a primary network operator by a primary network operator. After a period of time and/or use with the primary network operator, possibly refurbished and repackaged for use with a secondary or tertiary network operator. In developing or secondary or tertiary markets, consumers typically do not pay the relatively high premium for current devices (e.g., Africa, South America, Jamaica, etc.). This has contributed to the increased volume of sales of phones that are 1-5 years old with secondary and tertiary network operators. Moreover, after expiration of an initial device contract with the primary network operator, a user may wish to use a different network operator.
While in use with the primary network operator, a mobile device and software operating thereon may be updated, for example, if the carrier network has contracted with the device manufacturer to do so. When the mobile device is sold for use with a secondary or tertiary network operator, however, the mobile device may be operated on a mobile virtual network operator (MVNO), which can be a wireless communications provider that does not own the wireless network infrastructure over which the MVNO provides its service. As noted above, such networks or the like may not have an agreement with the device manufacturer. Accordingly, these mobile devices may not have full access to network services due to the lack of support by the device manufacturer. For example, a particular Access Point Name (APN) may be blocked for the device. An APN may refer to a connection between a mobile network and another computer network such as the Internet. Examples of APNs include the Internet, Wireless Application Protocol (WAP), Multimedia Messaging Service (MMS), WiFi, etc. Some APNs may be blocked from updating for a device, which can render the device less functional. As an example, Apple Inc.® can block MMS updates on older model iPhones®, which can prevent the MMS application from receiving messages and thereby rendering group messaging or chatting and/or Facetime® as nonfunctional or with a subpar user experience. Other applications may also be adversely affected by this as well. Thus, it would be advantageous to have a mechanism to provision devices that cannot communicate with the APN.
One proposed solution to the aforementioned issues is to (1) insert the SIM card from a mobile carrier network into a device, and (2) after entering the cellular data settings, remove the SIM card and insert the MVNO SIM. The APN can be changed to the MVNO-relevant APN. This process, however, has only mixed success, and MMS is still not updated thereby rendering group and/or picture messaging as inelegant. Another proposed solution is to manually install a profile on a device. This approach also does not solve issues related to MMS. Another proposed solution requires a user to jailbreak the device, which removes software restrictions imposed by the device manufacturer, and direct the subscriber to a jailbreaking resource site from which the mobile subscriber can find the relevant jailbreak source. Jailbreaking is also not a practical fix as this typically requires some technical aptitude and is also prone to risks that could render the device inoperable. Another example of how obtain full usability is by way the use of over-the-top MMS applications. Such applications allow the mobile subscriber to have MMS capabilities, but are not seamlessly integrated into the mobile device, thereby not making them easy to use. Examples of such over-the-top applications include MMSFree, PixDrop, and iSendMMS. The process of jailbreaking a phone is not user friendly, may raise legal issues, and may not solve the above issues. Thus, none of the above-proposed solutions fully addresses the issue of providing complete support for depreciated devices. Moreover, the inability to update depreciated devices result in an increased amount of customer care calls at the MVNO, which leads to subscriber customer frustration and dissatisfaction, along with increased costs and expense for the MVNO in handling the customer care calls.
According to an embodiment, a system is disclosed that includes a non-transitory memory and one or more hardware processors coupled thereto. The non-transitory memory may be configured to store data associated with a model of one or more mobile devices made by a manufacturer. The one or more hardware processors may be configured to read instructions from the non-transitory memory to cause the system to perform operations. An international mobile equipment identity (IMEI) may be received from the mobile device that identifies a model of the mobile device. The mobile device having at least one application that is unable to communicate with a server of a manufacturer of the mobile device. A provisioning server may determine a mobile device is depreciated based upon, for example, the IMEI, and obtain a key unique to the mobile device, which may include at least one Access Point Name (APN). The key may be then transmitted to the mobile device. The APN may direct the mobile device's traffic to the server of the manufacturer. The implementations disclosed herein may improve functionality and usage of depreciated mobile devices, reduce customer care calls and associated support costs for carriers, and ease subscriber frustration, among other benefits.
Additional features, advantages, and embodiments of the disclosed subject matter may be set forth or apparent from consideration of the following detailed description, drawings, and claims. Moreover, it is to be understood that both the foregoing summary and the following detailed description are exemplary and are intended to provide further explanation without limiting the scope of the claims.
The accompanying drawings, which are included to provide a further understanding of the disclosed subject matter, are incorporated in and constitute a part of this specification. The drawings also illustrate embodiments of the disclosed subject matter and together with the detailed description serve to explain the principles of embodiments of the disclosed subject matter. No attempt is made to show structural details in more detail than may be necessary for a fundamental understanding of the disclosed subject matter and various ways in which it may be practiced.
Disclosed are techniques which can allow a mobile device (e.g., a smartphone, tablet, or the like), which is no longer being updated by the device manufacturer, to receive updates from the manufacturer. For example, as many devices purchased new in the United States and other highly developed nations age or become obsolete for use with the respective primary network operator, the devices may be used with secondary and tertiary network operators where individuals are generally unwilling or unable to afford the price of the newest device from the manufacturer. The manufacturer can depreciate the device, meaning that the device can no longer receive updates from the manufacturer. A depreciated mobile device may refer to a mobile device for use with a network operator that does not have a relationship with the device manufacturer for automatically configuring the device to receive software updated from the device manufacturer. For example, a mobile device may be purchased brand new. The manufacturer of this mobile device may have a relationship with primary network operator A, but not network operator B. If the user of this mobile device elects to operate the phone on network of network operator B, the mobile device may be deemed “depreciated.” In general, the network operator B may be a second or tertiary network operator. As mentioned earlier, a secondary or tertiary network operator does not have an arrangement with the manufacturer to provide manufacturer updates. Thus, the device, when operated on the service provider's mobile network may be capable of engaging in voice communication (e.g., conventional telephony), or browsing the Internet, but applications specific to the manufacturer may no longer function properly. As an example the MMS application may be disabled, meaning that some features of the MMS application may not be functional, or the entire application may be non-functional. The inability to communicate with the manufacturer can be attributed to a lack of an APN which can direct the mobile devices traffic to the appropriate address of the manufacturer, thereby enabling communication between the mobile device's application and the manufacturer. Thus, the user can have the full experience of the manufacturer's device as it was originally intended.
Depreciated devices can be used with virtually all types of network operators. These devices are particularly prevalent in use with secondary or tertiary network operators in markets such as the Carribean or Africa, where the general population may not be willing to pay, or capable of paying, high premiums for the latest mobile device. Furthermore, even in developed markets, MVNOs may have depreciated devices. Thus, when a request is received from a mobile device in one of these markets or on an MVNO, the device may be provisioned by a provisioning server as disclosed herein.
At 310, a mobile device may have one or more applications that are unable to communicate with a server of a manufacturer of the mobile device (e.g., at least some features or the application itself is disabled). An IMEI may be received from the mobile device via the mobile network at 310. The IMEI may be used to determine the make and/or model of the mobile device and may be unique to the mobile device at 320. For example, the provisioning server in
If, however, the mobile device is determined to be depreciated, then a key may be obtained at 345. The key may include an APNs for the manufacturer of the mobile device that may allow a data stream for a particular application operating on the mobile device to communicate with the manufacturer's server. More specifically, in some mobile devices, a manufacturer may provide one or more applications on the mobile device, such as an MMS application. When the mobile device becomes depreciated by the manufacturer, these applications may no longer have complete functionality. The key, when downloaded to the mobile application as a part of the payload, as described below, or separately, may cause the mobile device to insert an APN so that the mobile device knows where to send traffic for the manufacturer. Upon download of the key, one or more processors of the mobile device may execute machine readable code associated with the key that causes a session to initiate on the mobile device. During the session, the APN for the manufacturer may be inserted. Subsequent to insertion of the APN, the session may terminate or close, and in some instances, the key may be deleted from the mobile device.
In some configurations, the key may be stored in the database associated with the provisioning server similar to database 250 in
Regardless of whether the key is obtained at 345 from a database of the provisioning server as in
In
In some instances, an indication may be sent to the manufacturer that the key has been successfully downloaded for the mobile device. This may provide the manufacturer with the ability to track the keys that have been requested so that the manufacture can independently verify that the provisioning server has requested the keys and to expect payment.
Embodiments of the presently disclosed subject matter may be implemented in and used with a variety of component and network architectures.
In some configurations, a universal integrated-circuit card (UICC) may contain some of the components illustrated by the computing device 20 in
Bus 21 allows data communication between processor 24 and memory 27, which may include ROM or flash memory (neither shown), and RAM (not shown), as previously noted. The RAM is generally the main memory into which the operating system and application programs are loaded. The ROM or flash memory can contain, among other code, the Basic Input-Output system (BIOS) which controls basic hardware operation such as the interaction with peripheral components. Applications resident with the computing device 20 are generally stored on and accessed via a computer readable medium, such as a hard disk drive (e.g., fixed storage 23), an optical drive, floppy disk, or other storage medium 25.
Fixed storage 23 may be integral with computing device 20 or may be separate and accessed through other interfaces. A network interface 29 may provide a direct connection to a remote server via a telephone link, to the Internet via an internet service provider (ISP), or a direct connection to a remote server via a direct network link to the Internet via a POP (point of presence) or other technique. Network interface 29 may provide such connection using wireless techniques, including digital cellular telephone connection, Cellular Digital Packet Data (CDPD) connection, digital satellite data connection, or the like. For example, network interface 29 may allow the computing device to communicate with other electronic devices via one or more local, wide-area, or other networks. Many other devices or components (not shown) may be connected in a similar manner (e.g., digital cameras or speakers). Conversely, all of the components shown in
More generally, various embodiments of the presently disclosed subject matter may include or be embodied in the form of computer-implemented processes and apparatuses for practicing those processes. Embodiments also may be embodied in the form of a computer program product having computer program code containing instructions embodied in non-transitory and/or tangible media, such as floppy diskettes, CD-ROMs, hard drives, USB (universal serial bus) drives, or any other machine readable storage medium, wherein, when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing embodiments of the disclosed subject matter. Embodiments also may be embodied in the form of computer program code, for example, whether stored in a storage medium, loaded into and/or executed by a computer, or transmitted over some transmission medium, such as over electrical wiring or cabling, through fiber optics, or via electromagnetic radiation, wherein when the computer program code is loaded into and executed by a computer, the computer becomes an apparatus for practicing embodiments of the disclosed subject matter.
When implemented on a general-purpose microprocessor, the computer program code segments configure the microprocessor to create specific logic circuits. In some configurations, a set of computer-readable instructions stored on a computer-readable storage medium may be implemented by a general-purpose processor, which may transform the general-purpose processor or a device containing the general-purpose processor into a special-purpose device configured to implement or carry out the instructions. Embodiments may be implemented using hardware that may include a processor, such as a general purpose microprocessor and/or an Application Specific Integrated Circuit (ASIC) that embodies all or part of the techniques according to embodiments of the disclosed subject matter in hardware and/or firmware. The processor may be coupled to memory, such as RAM, ROM, flash memory, a hard disk or any other device capable of storing electronic information. The memory may store instructions adapted to be executed by the processor to perform the techniques according to embodiments of the disclosed subject matter.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit embodiments of the disclosed subject matter to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to explain the principles of embodiments of the disclosed subject matter and their practical applications, to thereby enable others skilled in the art to utilize those embodiments as well as various embodiments with various modifications as may be suited to the particular use contemplated.
Patent | Priority | Assignee | Title |
11514441, | Apr 06 2015 | BITMARK, INC. | System and method for decentralized title recordation and authentication |
Patent | Priority | Assignee | Title |
20070299941, | |||
20090327398, | |||
20180139602, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jan 26 2018 | JAHR, CHRISTOPH | GIESECKE+DEVRIENT MOBILE SECURITY AMERICA, INC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 044785 | /0732 | |
Jan 31 2018 | GIESECKE+DEVRIENT MOBILE SECURITY AMERICA, INC. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jan 31 2018 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Aug 31 2024 | 4 years fee payment window open |
Mar 03 2025 | 6 months grace period start (w surcharge) |
Aug 31 2025 | patent expiry (for year 4) |
Aug 31 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Aug 31 2028 | 8 years fee payment window open |
Mar 03 2029 | 6 months grace period start (w surcharge) |
Aug 31 2029 | patent expiry (for year 8) |
Aug 31 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Aug 31 2032 | 12 years fee payment window open |
Mar 03 2033 | 6 months grace period start (w surcharge) |
Aug 31 2033 | patent expiry (for year 12) |
Aug 31 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |